Vulnerabilities / Threats
6/10/2013
02:49 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Palo Alto Networks Brings WildFire To The Private Cloud

Palo Alto Networks WF-500 appliance offers sandbox detection and analysis capabilities

Santa Clara, Calif., June 3, 2013 – Palo Alto Networks® (NYSE: PANW), the network security company&trade, today announced availability of the Palo Alto Networks WF-500 appliance, the first platform designed to deliver a private cloud solution for timely and thorough detection, analysis and prevention of advanced persistent threats (APTs).

Designed to meet the needs of customers with restrictions that preclude them from accessing a public cloud option, the Palo Alto Networks WF-500 appliance delivers the comprehensive sandbox detection and analysis capabilities of the Palo Alto Networks public cloud based WildFire subscription offering on a customer-owned platform. When deployed with an inline Palo Alto Networks next-generation firewall, the WF-500 also offers full prevention capabilities.

Only Palo Alto Networks offers this kind of "closed loop" prevention solution that includes private or public cloud deployment options, thorough detection and analysis of all network traffic, and the ability to automatically block malware and APTs with the Palo Alto Networks next-generation firewall.

QUOTES

· Securosis Analyst and President Mike Rothman commented on the benefits of a private cloud approach in a recent blog ("Network-based Malware Detection 2.0: Scaling NBMD"): "These malware-analysis private clouds provide a central analysis device and interact with enforcement points throughout the network. This provides the leverage of not having to deploy NBMD devices at all ingress points, as well as facilitating internal sharing of intelligence."

· "Quickly identifying and eliminating previously unknown threats across all applications is key to protecting an organization from today's advanced threats; only Palo Alto Networks offers its customers a public or private cloud deployment choice and the closed loop capabilities to most efficiently and effectively stop APTs," said Lee Klarich, senior vice president of product management, Palo Alto Networks.

Wildfire offers Superior Detection, Analysis and Prevention

Now used by more than 1,700 customers globally, the WildFire service aggregates suspicious files flagged by Palo Alto Networks next-generation firewalls deployed at customer sites around the world. The files are uploaded for analysis by Palo Alto Networks systems and experts. If a file is determined to be malware or an APT, a signature is generated and automatically sent to subscribing Palo Alto Networks WildFire customers' next-generation firewalls to provide protection from:

· The newly detected malware and its variants;

· Traffic that malware generates including unique domain queries; and

· Command-and-control and domain name system (DNS) traffic.

The WF-500 appliance offers these same advantages on a secure device inside the customer's network. Customers are then free to detect, analyze, and eradicate suspected threats in a private cloud under their control. If they choose to, they are also free to share confirmed findings with or receive updated malware signatures from the WildFire cloud service.

Availability

The Palo Alto Networks WF-500 appliance is available now. For more information and pricing, contact a local reseller or visit http://www.paloaltonetworks.com.

About Palo Alto Networks

Palo Alto Networks is the network security company. Its innovative platform allows enterprises, service providers, and government entities to secure their networks and safely enable the increasingly complex and rapidly growing number of applications running on their networks. The core of Palo Alto Networks platform is its Next-Generation Firewall, which delivers application, user, and content visibility and control integrated within the firewall through its proprietary hardware and software architecture. Palo Alto Networks products and services can address a broad range of network security requirements, from the data center to the network perimeter, as well as the distributed enterprise, which includes branch offices and a growing number of mobile devices. Palo Alto Networks products are used by more than 12,500 customers in over 100 countries. For more information, visit www.paloaltonetworks.com.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading December Tech Digest
Experts weigh in on the pros and cons of end-user security training.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-1421
Published: 2014-11-25
mountall 1.54, as used in Ubuntu 14.10, does not properly handle the umask when using the mount utility, which allows local users to bypass intended access restrictions via unspecified vectors.

CVE-2014-3605
Published: 2014-11-25
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2014-6407. Reason: This candidate is a reservation duplicate of CVE-2014-6407. Notes: All CVE users should reference CVE-2014-6407 instead of this candidate. All references and descriptions in this candidate have been removed to pre...

CVE-2014-7839
Published: 2014-11-25
DocumentProvider in RESTEasy 2.3.7 and 3.0.9 does not configure the (1) external-general-entities or (2) external-parameter-entities features, which allows remote attackers to conduct XML external entity (XXE) attacks via unspecified vectors.

CVE-2014-8001
Published: 2014-11-25
Buffer overflow in decode.cpp in Cisco OpenH264 1.2.0 and earlier allows remote attackers to execute arbitrary code via an encoded media file.

CVE-2014-8002
Published: 2014-11-25
Use-after-free vulnerability in decode_slice.cpp in Cisco OpenH264 1.2.0 and earlier allows remote attackers to execute arbitrary code via an encoded media file.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Now that the holiday season is about to begin both online and in stores, will this be yet another season of nonstop gifting to cybercriminals?